profil.2 (108028) | profil.2 (108087) |
---|---|
1.\" Copyright (c) 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Donn Seeley of BSDI. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)profil.2 8.1 (Berkeley) 6/4/93 | 1.\" Copyright (c) 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Donn Seeley of BSDI. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)profil.2 8.1 (Berkeley) 6/4/93 |
36.\" $FreeBSD: head/lib/libc/sys/profil.2 108028 2002-12-18 09:22:32Z ru $ | 36.\" $FreeBSD: head/lib/libc/sys/profil.2 108087 2002-12-19 09:40:28Z ru $ |
37.\" 38.Dd June 4, 1993 39.Dt PROFIL 2 40.Os 41.Sh NAME 42.Nm profil 43.Nd control process profiling 44.Sh LIBRARY --- 28 unchanged lines hidden (view full) --- 73the number of the corresponding bin is given 74by the relation: 75.Bd -literal -offset indent 76[(pc - offset) / 2] * scale / 65536 77.Ed 78.Pp 79The 80.Fa offset | 37.\" 38.Dd June 4, 1993 39.Dt PROFIL 2 40.Os 41.Sh NAME 42.Nm profil 43.Nd control process profiling 44.Sh LIBRARY --- 28 unchanged lines hidden (view full) --- 73the number of the corresponding bin is given 74by the relation: 75.Bd -literal -offset indent 76[(pc - offset) / 2] * scale / 65536 77.Ed 78.Pp 79The 80.Fa offset |
81parameter is the lowest address at which | 81argument is the lowest address at which |
82the kernel takes program counter samples. 83The 84.Fa scale | 82the kernel takes program counter samples. 83The 84.Fa scale |
85parameter ranges from 1 to 65536 and | 85argument ranges from 1 to 65536 and |
86can be used to change the span of the bins. 87A scale of 65536 maps each bin to 2 bytes of address range; 88a scale of 32768 gives 4 bytes, 16384 gives 8 bytes and so on. 89Intermediate values provide approximate intermediate ranges. 90A 91.Fa scale 92value of 0 disables profiling. 93.Sh RETURN VALUES --- 33 unchanged lines hidden --- | 86can be used to change the span of the bins. 87A scale of 65536 maps each bin to 2 bytes of address range; 88a scale of 32768 gives 4 bytes, 16384 gives 8 bytes and so on. 89Intermediate values provide approximate intermediate ranges. 90A 91.Fa scale 92value of 0 disables profiling. 93.Sh RETURN VALUES --- 33 unchanged lines hidden --- |